17 décembre 2020 | International, Aérospatial, Naval

Israel launches first-ever multitier missile defense test

JERUSALEM — The Israel Missile Defense Organization and the U.S. Missile Defense Agency for the first time demonstrated a multilayered air defense system using the Iron Dome, David's Sling and Arrow weapon systems in a recent series of tests.

“Using this approach, a variety of threats may be identified and intercepted via full coordination and interoperability between the systems,” Moshe Patel, the head of IMDO, said Monday. The organization falls under the purview of the Ministry of Defense, whose minster, Benny Gantz, praised the “development of a multilayered air defense system [that] secures us from threats near and far.”

The Iron Dome system has been used against rockets and other threats for the last decade, and joint development with the U.S. has supported the Arrow and David's Sling programs. Israel delivered the first of two Iron Dome batteries to the U.S. Army earlier this year.

The Israeli tests, which took place within the last few weeks but were announced Dec. 15, saw the systems deploy against cruise missile, UAV and ballistic missile targets.

While Israel said the results of the tests will enable industry engineers to evaluate and upgrade the capabilities of the system, the wider context is that the announcement comes amid tension with Iran as well as improved relations between Israel and a number of Gulf states, according to experts.

“U.S.-Israel cooperation on multilayered missile defense technologies continues to advance and is a critical factor in ensuring Israel can defend itself from a diverse array of threats posed by Iran and its proxies,” said Dan Shapiro, a visiting fellow at the Institute for National Security Studies, who served as U.S. ambassador to Israel in the Obama administration.

Jonathan Schanzer, senior vice president for research at the Foundation for Defense of Democracies, said the ability of Israel's Iron Dome system to hit guided munitions is significant, “particularly as Iran increasingly seeks to arm its terrorist proxies with weapons that [have] evasive qualities. Has Israel developed tech to counter Iran's lethal precision-guided munitions effort? It certainly seems so.”

The changing geopolitical environment in the region — particularly improved Israeli relations with Bahrain and the United Arab Emirates in recent months — is important, according to Udi Evental, a colonel in Israel's reserve-duty service and a senior fellow with the Institute for Policy and Strategy at the higher-education institution IDC Herzliya.

“The normalization process opens new opportunities both for Israel, Arab states in the Gulf and the U.S.,” Evental said. “Israel might be able to deploy sensors and other means closer to Iran in a way that could offer more and better interception opportunities. ... The U.S. could lead the command and control of such an architecture and integrate into it some American assets as well.”

Dan Feferman, a former strategic planner with the Israel Defense Forces and a fellow at the Jewish People Policy Institute, pointed out that “Iran spent a lot of money developing [its strike] capabilities. So [Israel] is testing [its weapons systems] out, and it is an attempt to show Iran and its proxies that [Israeli] capabilities will soon be neutralized and they might as well not bother trying.”

In addition to challenging the effectiveness of Iran's regional strategy, the tests also serve as a model for how Israel's neighbors can enhance their own defenses against Iranian threats, according to Shapiro, the former U.S. ambassador to Israel.

The tests, he explained, serve as “a source of deepened Israeli-Arab security coordination.” Gulf states could benefit from Israel's defense capabilities, especially in light of the drone and cruise missile attack on Saudi Arabia's Aramco facility in September 2019. Israel's MoD said the drill was in the works for a year, indicating that the planning came after the attack in Abqaiq.

Shapiro's colleague, Yoel Guzansky, added that recent reports noted one Gulf state is interested in buying air defense technology from Israel. He also described the Abqaiq attack as a motivator for the recent tests. “For years, cruise missiles were a problem that had to be addressed: Like drones, they fly at low altitudes.”

Patel indicated that any cooperative program like David's Sling and Arrow must be approved by the U.S. to market and export to Gulf customers. But Israel has more independence when it comes to Iron Dome, despite Raytheon's involvement in the system's U.S.-based manufacturing. Although it's too early to assume much, he said, “there is a lot of advantage like sharing information and sensors in those countries because we have the same enemies and launchers and more — but it is too early. We begin to build our defense cooperation; this could be considered in the future.”

Israel's MoD said the tests indicate the systems are capable of simultaneously intercepting threats. Rafael Advanced Defense Systems is the prime contractor for the development of the David's Sling weapon system, in cooperation with the Raytheon. Israel Aerospace Industries' Elta Systems subsidiary developed the Multi-Mission Radar, and Elbit Systems developed the Golden Almond battle management system, both of which were involved in the tests.

“When the different systems in the multilayered mechanism are combined, they may face a variety of simultaneous threats and defend the citizens of the state of Israel,” said retired Brig. Gen. Pini Yungman, executive vice president and head of Rafael's Air and Missile Defense Division.

The tests were carried out at sea for safety reasons. The Iron Dome has been integrated with Israel's Navy in the form of the C-Dome, which is to be deployed with the service's new Sa'ar 6-class corvettes. Officials said David's Sling can also be used at sea. During the tests, Iron Dome was used to intercept cruise missiles — a new capability for a system that has historically been deployed against unguided rockets, drones and mortars. Israel has generally used Iron Dome against short-range threats around the Gaza Strip and Golan, while Arrow was used for the first time in 2017 and David's Sling for the first time in 2018 against threats from Syria.

The Israel Defense Forces also integrated the multitiered system and sensors into a common air picture, tracking threats, sharing data and launching different interceptors with one command-and-control system for the first time. Combining multiple technologies using open architecture and sensors to create a kind of “glass battlefield” digital picture is a technology Rafael has been working on. This is also part of Israel's multiyear Momentum plan that foresees multilayered air defense as key to success in future wars against local adversaries and what Israel calls “third circle” threats like Iran.

https://www.defensenews.com/training-sim/2020/12/16/israels-launches-first-ever-multitier-missile-defense-test/

Sur le même sujet

  • Des F-18 Hornet australiens également livrés en Ukraine ?

    6 juin 2023 | International, Aérospatial

    Des F-18 Hornet australiens également livrés en Ukraine ?

    Depuis la mise à la retraite en 2021, l'Australie cherche à vendre ses derniers F/A-18A/B Hornet. Entre les avions crashés, conservés dans des musées et ceux déjà vendus, 38 appareils seraient encore disponibles. Or, d'après le journal australien The Australian Financial Review, l'Ukraine et l'Australie seraient en train de discuter pour une éventuelle livraison. Les F-18 australiens sont des Hornet de première génération mais ont été fortement améliorés, modernisés et revus structurellement entre 1999 et 2010.

  • The Army wants a better way to update software, buy smarter

    15 juin 2018 | International, C4ISR

    The Army wants a better way to update software, buy smarter

    By: Mark Pomerleau The Army is holding what it calls software solariums as a way to improve the business side of the service's multi-billion software efforts during the life of programs. “Software has become both a critically important element to readiness and a critically under-managed element of our capability portfolio,” Maj. Gen. Randy Taylor, commander of Communications and Electronics Command, said at the event held May 22-23. “Cohesive software management is a necessary enabler to maintaining overmatch in the multi-domain battle.” Providing software updates to units in austere field locations can be challenging. Prolonging such updates can make the systems they run on vulnerable. The Army has sought to develop new and innovative ways for automated software updates to these units. As the Army is also undergoing major IT modernization, both to its tactical and enterprise networks, software becomes a critical enabler in that future end state. “I believe that we are literally in the midst of the largest modernization of our networks,” Lt. Gen. Bruce Crawford, the Army CIO who began the software solariums as commander of CECOM, said at the recent event. “And that's all of our networks, from the tactical to the enterprise, to the business to the intelligence systems in the last 30 years.” With these modernization efforts, the Army realizes it must be better stewards of overall software costs. “We've got to be more holistic on how we approach this, especially when you consider that we, the U.S. taxpayer, spend 55 to 70 percent of a program's lifecycle on that post-acquisition and post-operations sustainment. That's a pretty big bill,” Taylor said. During a March conference, Crawford noted the service spends about $3 billion over a five year period on enterprise software sustainment. The previous solariums, officials said, have included new patching solutions and a goal to have no more than two fielded software baselines at any one time for all programs of record. Army leaders said CECOM will coordinate with stakeholders to finalize recommendations in the coming months. Those goals then will be submitted to the Army level Information Technology Oversight Council for approval and implementation. https://www.c4isrnet.com/it-networks/2018/06/14/the-army-wants-a-better-way-to-update-software-buy-smarter/

  • Pentagon is rethinking its multibillion-dollar relationship with U.S. defense contractors to boost supply chain security

    14 août 2018 | International, Aérospatial, Naval, Terrestre, C4ISR

    Pentagon is rethinking its multibillion-dollar relationship with U.S. defense contractors to boost supply chain security

    By Ellen Nakashima The Pentagon has a new goal aimed at protecting its $100 billion supply chain from foreign theft and sabotage: to base its weapons contract awards on security assessments — not just cost and performance — a move that would mark a fundamental shift in department culture. The goal, based on a strategy called Deliver Uncompromised, comes as U.S. defense firms are increasingly vulnerable to data breaches, a risk highlighted earlier this year by China's alleged theft of sensitive information related to undersea warfare, and the Pentagon's decision last year to ban software made by the Russian firm Kaspersky Lab. On Monday, President Trump signed into a law a provision that would bar the federal government from buying equipment from Chinese telecommunications firms Huawei and ZTE Corp., a measure spurred by lawmakers' concerns about Chinese espionage. “The department is examining ways to designate security as a metric within the acquisition process,” Maj. Audricia Harris, a Pentagon spokeswoman, said in a statement. “Determinations [currently] are based on cost, schedule and performance. The department's goal is to elevate security to be on par with cost, schedule and performance.” The strategy was written by Mitre Corp., a nonprofit company that runs federally funded research centers, and the firm released a copy of its reportMonday. “The major goal is to move our suppliers, the defense industrial base and the rest of the private sector who contribute to the supply chain, beyond a posture of compliance — to owning the problem with us,” said Chris Nissen, director of asymmetric-threat response at Mitre. Harris said the Pentagon will review Mitre's recommendations before proceeding. She added that the Department of Defense, working with Congress and industry, “is already advancing to elevate security within the supply chain.” Testifying to Congress in June, Kari Bingen, the Pentagon's deputy undersecretary for intelligence, said: “We must have confidence that industry is delivering capabilities, technologies and weapon systems that are uncompromised by our adversaries, secure from cradle to grave.” Security should be seen not as a “cost burden,” she told the House Armed Services Committee, “but as a major factor in their competitiveness for U.S. government business.” The new strategy is necessary, officials say, because U.S. adversaries can degrade the military's battlefield and technological advantage by using “blended operations” — hacking and stealing valuable data, manipulating software to sabotage command and control systems or cause weapons to fail, and potentially inducing a defense firm employee to insert a faulty component or chip into a system. “A modern aircraft may have more than 10 million lines of code,” Mitre's report said. “Combat systems of all types increasingly employ sensors, actuators and software-activated control devices.” The term “Deliver Uncompromised” grew out of a 2010 meeting of senior counterintelligence policy officials, some of whom lamented that the Defense Department was tolerating contractors repeatedly delivering compromised capabilities to the Pentagon and the intelligence community. Addressing the security issue requires greater participation by counterintelligence agencies, which can detect threats against defense firms, the report said, and ideally, the government should establish a National Supply Chain Intelligence Center to monitor threats and issue warnings to all government agencies. Ultimately, the military's senior leaders bear responsibility for securing the supply chain and must be held accountable for it, the report said. The Defense Department, although one of the world's largest equipment purchasers, cannot control all parts of the supplier base. Nonetheless, it has influence over the companies it contracts with as it is the principal source of business for thousands of companies. It can shape behavior through its contracts to enhance supply-chain security, the report said. Legislation will be needed to provide incentives to defense and other private-sector companies to boost security, Mitre said. Congress should pass laws that shield firms from being sued if they share information about their vulnerabilities that could help protect other firms against cyberattacks; or if they are hacked by a foreign adversary despite using advanced cybersecurity technologies, the report said. Contractors should be given incentives such as tax breaks to embrace supply chain security, the report suggested. The Department of Homeland Security is addressing the security of the information technology supply chain through its newly established National Risk Management Center. “What we're saying is you should be looking at what vendors are doing to shore up their cybersecurity practices to protect the supply chain,” said Christopher Krebs, DHS undersecretary for the National Protection and Programs Directorate. The National Counterintelligence and Security Center, an agency of the Office of the Director of National Intelligence that coordinates the government's counterintelligence strategy, said in a report last month that software-supply-chain infiltration has already threatened critical infrastructure and is poised to endanger other sectors. According to the NCSC, last year “represented a watershed in the reporting of software supply chain” attacks. There were “numerous events involving hackers targeting software supply chains with back doors for cyber espionage, organizational disruption or demonstrable financial impact,” the agency found. https://www.washingtonpost.com/world/national-security/the-pentagon-is-rethinking-its-multibillion-dollar-relationship-with-us-defense-contractors-to-stress-supply-chain-security/2018/08/12/31d63a06-9a79-11e8-b60b-1c897f17e185_story.html?noredirect=on&utm_term=.265ce85b6eb1

Toutes les nouvelles